9.8
CVSSv3

CVE-2020-14001

Published: 17/07/2020 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The kramdown gem prior to 2.3.0 for Ruby processes the template option inside Kramdown documents by default, which allows unintended read access (such as template="/etc/passwd") or unintended embedded Ruby code execution (such as a string that begins with template="string://<%= `). NOTE: kramdown is used in Jekyll, GitLab Pages, GitHub Pages, and Thredded Forum.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

kramdown project kramdown

debian debian linux 9.0

debian debian linux 10.0

fedoraproject fedora 31

fedoraproject fedora 32

canonical ubuntu linux 20.04

Vendor Advisories

Debian Bug report logs - #965305 ruby-kramdown: CVE-2020-14001 Package: src:ruby-kramdown; Maintainer for src:ruby-kramdown is Debian Ruby Extras Maintainers &lt;pkg-ruby-extras-maintainers@listsaliothdebianorg&gt;; Reported by: Salvatore Bonaccorso &lt;carnil@debianorg&gt; Date: Sun, 19 Jul 2020 06:42:02 UTC Severity: grave ...